{"title":"传统公钥密码体制与椭圆曲线密码体制","authors":"Maria Isaura Lopez, Ayad F. Barsoum","doi":"10.4018/ijcre.309688","DOIUrl":null,"url":null,"abstract":"The need to establish safer communication channels in a world where technological development is progressing in leaps and bounds is indispensable. Thus, implementing cryptographic algorithms, which are more complex to compromise, improves the possibilities of securing our sensitive data. In this paper, the authors analyze the algorithmic foundations and perform a comparative analysis of the traditional public-key cryptographic algorithms (e.g., RSA, ElGamal, Schnorr, DSA) and elliptic curve cryptography with NIST recommended curves. In the study, they focus on six different security strengths: 80-, 96-, 112-, 128-, 192-, and 256-bit key sizes. Moreover, this study provides a benchmark among different curves (NIST, SEC2, and IEFT Brainpool) that can be used with various security levels. The authors study and compare the characteristics and performance of the traditional asymmetric algorithms and the elliptic curve algorithms for information security. The results obtained in this study will be graphically visualized through statistical graphs and tables with quantification response times.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"220 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography\",\"authors\":\"Maria Isaura Lopez, Ayad F. Barsoum\",\"doi\":\"10.4018/ijcre.309688\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need to establish safer communication channels in a world where technological development is progressing in leaps and bounds is indispensable. Thus, implementing cryptographic algorithms, which are more complex to compromise, improves the possibilities of securing our sensitive data. In this paper, the authors analyze the algorithmic foundations and perform a comparative analysis of the traditional public-key cryptographic algorithms (e.g., RSA, ElGamal, Schnorr, DSA) and elliptic curve cryptography with NIST recommended curves. In the study, they focus on six different security strengths: 80-, 96-, 112-, 128-, 192-, and 256-bit key sizes. Moreover, this study provides a benchmark among different curves (NIST, SEC2, and IEFT Brainpool) that can be used with various security levels. The authors study and compare the characteristics and performance of the traditional asymmetric algorithms and the elliptic curve algorithms for information security. The results obtained in this study will be graphically visualized through statistical graphs and tables with quantification response times.\",\"PeriodicalId\":324985,\"journal\":{\"name\":\"International Journal of Cyber Research and Education\",\"volume\":\"220 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Research and Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijcre.309688\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Research and Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcre.309688","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Traditional Public-Key Cryptosystems and Elliptic Curve Cryptography
The need to establish safer communication channels in a world where technological development is progressing in leaps and bounds is indispensable. Thus, implementing cryptographic algorithms, which are more complex to compromise, improves the possibilities of securing our sensitive data. In this paper, the authors analyze the algorithmic foundations and perform a comparative analysis of the traditional public-key cryptographic algorithms (e.g., RSA, ElGamal, Schnorr, DSA) and elliptic curve cryptography with NIST recommended curves. In the study, they focus on six different security strengths: 80-, 96-, 112-, 128-, 192-, and 256-bit key sizes. Moreover, this study provides a benchmark among different curves (NIST, SEC2, and IEFT Brainpool) that can be used with various security levels. The authors study and compare the characteristics and performance of the traditional asymmetric algorithms and the elliptic curve algorithms for information security. The results obtained in this study will be graphically visualized through statistical graphs and tables with quantification response times.